Static task
static1
Behavioral task
behavioral1
Sample
452d9487eb888d7b5827db8714516dda_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
452d9487eb888d7b5827db8714516dda_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
452d9487eb888d7b5827db8714516dda_JaffaCakes118
-
Size
224KB
-
MD5
452d9487eb888d7b5827db8714516dda
-
SHA1
b495164e8aca661e94115de1c2b7019cbe0bb91d
-
SHA256
dab934a4f9517025730758c2f9e09cdcce19d11e405d9328e33851f3d9a882b9
-
SHA512
2e26c062c379860a2cdc6289759155c7d96e7957ffd7a1331e670c54b7bce3d25dea39aca7a1ea1572505bde6541fd18be8c1827836f5f5d0aaf69b7baabbf7f
-
SSDEEP
3072:Ak8pLlJl3nmJFOSrcJw84CelRvq9Mttc5l+/nYP:AFdlmJFOKBCe3Uw5/nYP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 452d9487eb888d7b5827db8714516dda_JaffaCakes118
Files
-
452d9487eb888d7b5827db8714516dda_JaffaCakes118.dll windows:4 windows x86 arch:x86
f8f9881e7deb453fa9adde0a61a24228
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
GetWindowsDirectoryW
FindClose
FindFirstFileW
GetProcAddress
LoadLibraryW
CreateProcessW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
WaitForSingleObject
GetFileAttributesW
ReadFile
LocalFileTimeToFileTime
CreateDirectoryW
GetCurrentDirectoryW
SetFileTime
CreateFileA
SetEndOfFile
GetLocaleInfoA
CreateFileW
WriteFile
CloseHandle
lstrcpynW
GetTickCount
SystemTimeToFileTime
GetSystemTime
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
GetConsoleCP
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
FlushFileBuffers
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
user32
GetWindowTextW
IsWindowVisible
GetWindow
EnumWindows
SetForegroundWindow
MessageBoxW
GetDesktopWindow
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
ole32
CoInitialize
StringFromGUID2
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitializeEx
shlwapi
SHDeleteKeyW
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ